EDIT: A new update has been released, please upgrade your site, the following issue is addressed within the 3.2 update.
A vulnerability has been identified in eFiction, which could be exploited by remote attackers to execute arbitrary commands. This issue is due to input validation errors in the "bridges/SMF/logout.php" and "get_session_vars.php" scripts that do not validate the "path_to_smf" parameter, which could be exploited by remote attackers to include malicious PHP scripts and execute arbitrary commands with the privileges of the web server.
See here for more details.
Affected Versions: eFiction version 3.1.1 and prior
A vulnerability has been found in the eFiction SMF included bridge, and until this can be fixed I suggest that anyone using the bridge disable/remove it for the time being to avoid having your site hacked/exploited.
Thank you,
Becca
Just to make it clear to everyone - your site may be vulnerable even if you are not using the SMF bridge
If you use the SMF bridge:
- ensure register_globals is set to off in your PHP configuration to prevent the hack from working.
If you do use the SMF bridge:
- delete the bridges folder
- ensure register_globals is set to off in your PHP configuration anyway as it is a security hole waiting to happen
- ensure register_globals is set to off in your PHP configuration anyway as it is a security hole waiting to happen
How would one go about switching it off? I've deleted my Bridges folder since I wasn't using it, but I've checked and my register_globals is set to ON.
Create a file called .htaccess in notepad, that contains the following line:
php_flag register_globals off
Save it and upload it to your efiction directory.